You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
Would your company be prepared in the event of: * Computer-driven espionage * A devastating virus attack * A hacker's unauthorized access * A breach of data security? As the sophistication of computer technology has grown, so has the rate of computer-related criminal activity. Subsequently, American corporations now lose billions of dollars a year to hacking, identity theft, and other computer attacks. More than ever, businesses and professionals responsible for the critical data of countless customers and employees need to anticipate and safeguard against computer intruders and attacks. The first book to successfully speak to the nontechnical professional in the fields of business and law o...
The first full-scale overview of cybercrime, law, and policy
Ideal for web developers using Zope to create a manageable and dynamic Web site environment. Expert advice on using the most popular open source Web application server available, with a step-by-step, how-to for Zope-based systems.
This book examines the convergent paths of the Internet and the American military, interweaving a history of the militarized Internet with analysis of a number of popular Hollywood movies in order to track how the introduction of the Internet into the war film has changed the genre, and how the movies often function as one part of the larger Military-Industrial- Media-Entertainment Network and the Total War Machine. The book catalogues and analyzes representations of a militarized Internet in popular Hollywood cinema, arguing that such illustrations of digitally networked technologies promotes an unhealthy transhumanism that weaponizes the relationships between the biological and technological aspects of that audience, while also hierarchically placing the “human” components at the top. Such filmmaking and movie-watching should be replaced with a critical posthumanism that challenges the relationships between the audience and their technologies, in addition to providing critical tools that can be applied to understanding and potentially resist modern warfare.
Why did the youthful optimism and openness of the sixties give way to Ronald Reagan and the spirit of conservative reaction--a spirit that remains ascendant today? Drawing on a wide array of sources--including tabloid journalism, popular fiction, movies, and television shows--Philip Jenkins argues that a remarkable confluence of panics, scares, and a few genuine threats created a climate of fear that led to the conservative reaction. He identifies 1975 to 1986 as the watershed years. During this time, he says, there was a sharp increase in perceived threats to our security at home and abroad. At home, America seemed to be threatened by monstrous criminals--serial killers, child abusers, Sata...
Rock Brands: Selling Sound in a Media Saturated Culture, edited by Elizabeth Barfoot Christian, is an edited collection that explores how different genres of popular music are branded and marketed today. The book's core objectives are addressed over three sections. In the first part of Rock Brands, the authors examine how established mainstream artists/bands are continuing to market themselves in an ever-changing technological world, and how bands can use integrated marketing communication to effectively 'brand' themselves. This branding is intended as a protection so that technology and delivery changes don't stifle the bands' success. KISS, AC/DC, Ozzy Osbourne, Phish, and Miley Cyrus are ...
For school librarians, technology is an essential component of their work. To meet the growing need in this area, Odin Jurkowski first wrote Technology and the School Library in 2006. To address the technological advancements, Jurkowski provides an overview of the types of technologies used in school libraries, from traditional low-tech options to the latest developments, describing how the school librarian interacts with and works with the technology. Updated throughout, this 4th edition addresses the continuously changing nature of technology, including Chromebooks, augmented reality, virtual reality, and generative AI. Major topics covered in this volume include information resources in the school library, the different varieties of educational software available, resources available via the web, and what to include on a school library website. This book also addresses tools that can be used in classrooms and technology administration: everything from automation and filters to student safety and security systems.
"This is the book executives have been waiting for. It is clear: With deep expertise but in nontechnical language, it describes what cybersecurity risks are and the decisions executives need to make to address them. It is crisp: Quick and to the point, it doesn't waste words and won't waste your time. It is candid: There is no sure cybersecurity defense, and Chris Moschovitis doesn't pretend there is; instead, he tells you how to understand your company's risk and make smart business decisions about what you can mitigate and what you cannot. It is also, in all likelihood, the only book ever written (or ever to be written) about cybersecurity defense that is fun to read." —Thomas A. Stewart...
This comprehensive volume recounts the ways reference librarians have adapted traditional services to deal with the changes in both information technologies and library patrons. New Technologies and Reference Services shows how to provide needed services using videoconferencing, interactive classrooms, drop-in seminars, and required courses. It also discusses the other implications of new technologies, including developing trends in publishing, copyright issues, collection strategies, and decentralizing library reference services.
This book outlines the development currently underway in the technology of new media and looks further to examine the unforeseen effects of this phenomenon on our culture, our philosophies, and our spiritual outlook.